CN108462724B - Data sharing method, device, system, member node and readable storage medium - Google Patents

Data sharing method, device, system, member node and readable storage medium Download PDF

Info

Publication number
CN108462724B
CN108462724B CN201810470510.3A CN201810470510A CN108462724B CN 108462724 B CN108462724 B CN 108462724B CN 201810470510 A CN201810470510 A CN 201810470510A CN 108462724 B CN108462724 B CN 108462724B
Authority
CN
China
Prior art keywords
member node
query
risk data
node
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810470510.3A
Other languages
Chinese (zh)
Other versions
CN108462724A (en
Inventor
张晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Jingdong Technology Holding Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN201810470510.3A priority Critical patent/CN108462724B/en
Publication of CN108462724A publication Critical patent/CN108462724A/en
Application granted granted Critical
Publication of CN108462724B publication Critical patent/CN108462724B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The disclosure relates to a data sharing method, a device, a system, a member node and a readable storage medium, and relates to the technical field of computers. The method of the present disclosure comprises: a first member node receives a risk data query request sent by a second member node, wherein the first member node and the second member node are member nodes in a blockchain system; checking whether the evidence-passing state of the second member node meets the condition of the risk data query or not, wherein the evidence-passing state is stored in the block chain and is used for reflecting the risk data query capability of the second member node; under the condition that the second member node evidence-passing state meets the condition of the risk data query, returning a risk data query result to the second member node; and initiating a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain, wherein the query information comprises the change information of the evidence passing states of the first member node and the second member node caused by the risk data query.

Description

Data sharing method, device, system, member node and readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data sharing method, apparatus, system, member node, and readable storage medium.
Background
Risk control has a significant impact on the operation of an enterprise. In the process of carrying out various risk control related businesses, enterprises need to collect risk data, construct a risk control system and finally serve related business scenes. In the process of developing risk control business, each enterprise often generates the requirement of data sharing so as to improve the corresponding wind control capability.
At present, the main mode of risk data sharing is that data is shared among enterprises through an inquiry interface, and an inquired party carries out pricing charging according to inquiry flow.
Disclosure of Invention
The inventor finds that: the risk data sharing mechanism based on the interface query technology is lack of a uniform data pricing mechanism, the price is completely set by a data provider, and under the premise that information is asymmetric, a data user cannot confirm whether the payment price is reasonable or not, so that fair query among enterprises is not facilitated, and data can be better shared among the enterprises. The inventor hopes to provide a scheme for realizing transparent and safe risk data sharing among enterprises based on the block chain technology. However, the risk data is generally required to be real-time, for example, when the internet financial platform approves the loan based on the personal credit record, the user credit record is required to be inquired in real time. Therefore, how to implement real-time, transparent and safe risk data sharing among enterprises based on the block chain technology is one of the technical problems to be solved by the invention.
One technical problem to be solved by the present disclosure is: how to realize real-time, transparent and safe risk data sharing among enterprises based on a block chain technology.
According to some embodiments of the present disclosure, there is provided a data sharing method, including: a first member node receives a risk data query request sent by a second member node, wherein the first member node and the second member node are member nodes in a block chain system; the first member node checks whether the evidence passing state of the second member node meets the condition of the risk data query or not, and the evidence passing state is stored in the block chain and used for reflecting the risk data query capability of the second member node; the first member node returns a risk data query result to the second member node under the condition that the second member node evidence-passing state meets the condition of the risk data query; and the first member node initiates a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain, wherein the query information comprises the change information of the evidence passing state of the first member node and the second member node caused by the risk data query.
In some embodiments, the pass status includes: the number of the general certificates; the first member node returns the risk data query result to the second member node, and the risk data query result comprises the following steps: and the first member node returns a risk data query result to the second member node according to the evidence passing number of the second member node under the condition that the evidence passing number of the second member node reaches the threshold value, wherein the number of the risk data contained in the risk data query result is not more than the evidence passing number of the second member node.
In some embodiments, the blockchain server of the first member node receives a risk data query request sent by the blockchain server of the second member node, the risk data query request being sent by the business server of the second member node to the blockchain server of the second member node; the block chain server of the first member node checks whether the evidence passing state of the second member node meets the condition of the risk data query; the block chain server of the first member node forwards a risk data query request to a service server of the first member node and receives a risk data query result returned by the service server of the first member node under the condition that the certification status of the second member node meets the condition of the risk data query; the block chain server of the first member node returns a risk data query result to the service server of the second node through the block chain server of the second member node; and the blockchain server of the first member node initiates a query confirmation request according to the risk data query result so that the member nodes in the blockchain system write the query information of the first member node and the second member node into the blockchain.
In some embodiments, the method further comprises: the service server of the second member node sends an address query request to the blockchain server of the second member node; and the service server of the second member node receives the address of the blockchain server of each member node of the latest version returned by the blockchain server of the second member node, so that the service server of the second member node selects the address of the blockchain server of the first member node and initiates a risk data query request.
In some embodiments, the method further comprises: the second member node audits the query information of the first member node and the second member node stored in the block chain, and whether the query information is correct is determined; the second member node responds to the error of the query information and initiates a certification-based correction request to the member nodes in the blockchain system, so that the member nodes in the blockchain system write the certification-based correction information into the blockchain and correct the error query information; and the first member node responds to the verification and correction information written in the block chain and re-initiates a query confirmation request according to the query information of the correct risk data.
In some embodiments, validating the positive query request comprises: the platform node signs the query ID corresponding to the wrong query information; writing the general authentication positive information into the block chain by the member node in the block chain system comprises the following steps: verifying the signature of the platform node on the query ID by the member node in the block chain system according to the public key of the platform node; and the member nodes in the block chain system inquire corresponding wrong inquiry information according to the inquiry ID, and verify whether the current evidence passing quantity of the first member node and the second member node is enough to carry out correction or not according to the change of the evidence passing states of the first member node and the second member node recorded in the wrong inquiry information.
In some embodiments, writing query information for a first member node and a second member node to a blockchain by a member node in the blockchain system comprises: a member node in a block chain system receives a query confirmation request sent by a first member node, wherein the query confirmation request comprises query information of risk data; the member nodes in the block chain system verify the received inquiry information of the risk data according to the intelligent contract and return a verification result; and the member nodes in the block chain system receive the blocks generated according to the inquiry information of the risk data and add the blocks into the block chain, wherein the blocks comprise the state change information of the certificates of both risk data inquiry parties.
In some embodiments, the pass status includes: the number of the general certificates; the change of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query.
In some embodiments, the pass includes a query pass and a rights pass; the risk data requester deducts the corresponding inquiry permit number according to the number of the risk data hit by inquiry, and the risk data provider increases the corresponding inquiry permit number and the right and interest permit number according to the number of the risk data hit by inquiry; the rights and benefits voucher is used for reflecting the value of risk data provided by each member node in a preset period, and is exchanged to query vouchers according to the exchange rate of the current period specified by the intelligent contract.
According to still other embodiments of the present disclosure, there is provided a member node, which is a first member node in a blockchain system, including: the query request receiving module is used for receiving a risk data query request sent by a second member node, wherein the second member node is a member node in the block chain system; the checking module is used for checking whether the evidence passing state of the second member node meets the condition of the risk data inquiry, and the evidence passing state is stored in the block chain and used for reflecting the risk data inquiry capability of the second member node; the query result sending module is used for returning a risk data query result to the second member node under the condition that the second member node evidence-passing state meets the condition of the risk data query; and the query confirmation module is used for initiating a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain, and the query information comprises the change information of the evidence passing state of the first member node and the second member node caused by the risk data query.
In some embodiments, the pass status includes: the number of the general certificates; the query result sending module is used for returning a risk data query result to the second member node according to the number of the second member node in the condition that the number of the second member node in the evidence is up to the threshold value, wherein the number of the risk data contained in the risk data query result is not more than the number of the second member node in the evidence.
In some embodiments, the first member node comprises: a service server and a block chain server; the query request receiving module is arranged on the blockchain server and used for receiving a risk data query request sent by the blockchain server of the second member node, and the risk data query request is sent to the blockchain server of the second member node by the service server of the second member node; the checking module is arranged on the block chain server and used for forwarding a risk data query request to a service server of the first member node and receiving a risk data query result returned by the service server of the first member node under the condition that the certification status of the second member node meets the condition of the risk data query; the query result sending module is arranged on the blockchain server and used for returning a risk data query result to the service server of the second node through the blockchain server of the second member node; the query confirmation module is arranged on the blockchain server and used for initiating a query confirmation request according to the risk data query result so that the member nodes in the blockchain system write the query information of the first member node and the second member node into the blockchain.
In some embodiments, the pass status includes: the number of the general certificates; the change of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query.
In some embodiments, the pass includes a query pass and a rights pass; the risk data requester deducts the corresponding inquiry permit number according to the number of the risk data hit by inquiry, and the risk data provider increases the corresponding inquiry permit number and the right and interest permit number according to the number of the risk data hit by inquiry; the rights and benefits voucher is used for reflecting the value of risk data provided by each member node in a preset period, and is exchanged to query vouchers according to the exchange rate of the current period specified by the intelligent contract.
According to still other embodiments of the present disclosure, there is provided a data sharing system including: a member node configured as a first member node in any of the preceding embodiments; and the second member node is used for sending a risk data query request to the first member node and receiving a risk data query result returned by the first member node under the condition that the evidence-passing state of the second member node meets the condition of the risk data query.
In some embodiments, the second member node comprises: a service server and a block chain server; the business server of the second member node is used for sending an address query request to the blockchain server of the second member node, receiving the address of the blockchain server of each member node of the latest version returned by the blockchain server of the second member node, selecting the address of the blockchain server of the first member node, and sending a risk data query request.
In some embodiments, the second member node is further configured to audit query information of the first member node and the second member node stored in the blockchain, determine whether the query information is correct, and initiate a certification approval request to a member node in the blockchain system in response to a query information error, so that the member node in the blockchain system writes the certification approval information into the blockchain and approves the wrong query information; the first member node is also used for responding to the evidence-based conflict information written into the block chain and reinitiating the inquiry confirmation request according to the inquiry information of the correct risk data.
In some embodiments, validating the positive query request comprises: the platform node signs the query ID corresponding to the wrong query information; the system further comprises: at least one other member node; and the other member nodes are used for verifying the signature of the platform node on the query ID according to the public key of the platform node, querying corresponding wrong query information according to the query ID, and verifying whether the current verification quantity of the first member node and the second member node is enough to correct the current verification quantity according to the change of the verification states of the first member node and the second member node recorded in the wrong query information.
In some embodiments, the system further comprises: at least one other member node; the other member nodes are used for receiving a query confirmation request sent by the first member node, and the query confirmation request comprises query information of the risk data; verifying the received inquiry information of the risk data according to the intelligent contract and returning a verification result; and receiving a block generated according to the inquiry information of the risk data, and adding the block into a block chain, wherein the block comprises the state change information of the certificates of both risk data inquiry parties.
According to still other embodiments of the present disclosure, there is provided a data sharing apparatus including: a memory; and a processor coupled to the memory, the processor configured to perform the data sharing method of any of the preceding embodiments based on instructions stored in the memory device.
According to further embodiments of the present disclosure, there is provided a computer-readable storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the data sharing method of any of the foregoing embodiments.
The sharing of risk data among federation members is achieved in the present disclosure based on blockchain techniques. The evidence-passing state of the member nodes in the blockchain system is recorded in the blockchain and is used for reflecting the risk data query capability. After receiving a risk data query request sent by a second member node, a first member node verifies the second member node based on the certification passing state of the second member node recorded in the block chain, and returns a risk data query result to the second member node in real time under the condition that the certification passing state of the second member node meets the condition of the risk data query. And then the first member node can initiate a query confirmation request according to the query of the current risk data so that the member nodes in the block chain system write the query information into the block chain. The general certificate in the disclosure is used as a certificate for risk data query, and the query process of the risk data can be reflected through the state change of the general certificate of each member node, and the query capability of the member node can also be verified. The risk data between enterprises are inquired in a public and transparent mode, the inquiry information is safely recorded and cannot be falsified, the tracing is convenient, and transparent and safe risk data sharing among the enterprises is realized.
Other features of the present disclosure and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 illustrates a flow diagram of a data sharing method of some embodiments of the present disclosure.
Fig. 2 shows a flow diagram of a data sharing method of further embodiments of the present disclosure.
Fig. 3 shows a flow chart of a data sharing method according to further embodiments of the present disclosure.
Fig. 4 shows a flow diagram of a data sharing method of still further embodiments of the present disclosure.
Fig. 5 illustrates a structural schematic of a member node of some embodiments of the present disclosure.
Fig. 6 illustrates a structural schematic diagram of a data sharing system of some embodiments of the present disclosure.
Fig. 7 shows a schematic structural diagram of a data sharing apparatus according to some embodiments of the present disclosure.
Fig. 8 shows a schematic structural diagram of a data sharing device according to another embodiment of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all of the embodiments. The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
The data sharing method is realized based on a block chain technology. Each alliance member sharing the risk data can set member nodes in the blockchain system, and the alliance members inquire the risk data through the member nodes and record inquiry information in the blockchain.
Each member node may be configured to have the same functionality. For example, each member node may store the same blockchain (or ledger) in which query information between member nodes is recorded. Each member node may be configured with the same intelligent contract (or chain code), and the intelligent contract specifies the verification mode, execution step and the like of the query information. The member nodes can execute various actions by calling the intelligent contracts, and the intelligent contracts are equivalent to the actions which can be executed by the nodes and are not allowed to exceed the contract scope. Each member node can also be provided with a block chain state database, records the latest state of the block chain, and can also record the certification state of each member node. The blockchain state database may change as the query information and blockchain are updated.
Some embodiments of the data sharing methods of the present disclosure are described below in conjunction with fig. 1.
Fig. 1 is a flow chart of some embodiments of the disclosed data sharing method. As shown in fig. 1, the method of this embodiment includes: steps S102 to S108.
Step S102, the first member node receives a risk data query request sent by the second member node.
The first member node is a risk data inquirer, namely a risk data provider, and the second member node is a risk data inquirer, namely a risk data requester. Risk data include, for example: at least one of a user blacklist, a user white list and a user grey list.
The risk data query request includes, for example: and the identifier of the user to which the risk data to be inquired belongs. For example, the second member node may carry an identifier that uniquely identifies the user, such as the name, identification number, and phone number of the user a, in the risk data query request, in order to query the credit record of the user a. The second member node may perform individual queries or batch (multiple users) queries. The risk data query request may further include: a timestamp, an identification of the second member node (inquirer), a query type (personal or batch), etc.
In order to further improve the security of risk data query and protect the privacy of users. The identification of the user to which the risk data to be queried belongs can be encrypted, and the encryption method with the same negotiation can be adopted for encryption, so that the subsequent decryption of the first member node is facilitated. For example, the public key of the first member node may be used to encrypt the identifier of the user to which the risk data to be queried belongs to obtain an encrypted result, so that the first member node subsequently decrypts the encrypted result by using its own private key. Furthermore, the second member node can also utilize the private key of the second member node to sign the encrypted result of the identifier of the user to which the risk data to be queried belongs, so that the first member node can verify that the information belongs to the information sent by the second member node, and the security of risk data query is further enhanced.
And step S104, the first member node checks whether the evidence-passing state of the second member node meets the condition of the risk data query.
The certification passing state of the member node comprises the following steps: the number of held certificates can be used to reflect the risk data query capability of the member node, for example, the number of risk data that can be requested, and the certificate passing status of the member node may further include: and inquiring the change information of the corresponding number of the certificates and the like each time. The state change of the general evidence reflects the query behaviors of the two query parties and the number of the query risk data.
The general evidence is designed to protect the privacy of the risk data and facilitate the inquiry information through the block chain record. Because the risk data cannot be directly recorded in the blockchain in consideration of privacy, the pass certificate is used as the reflection of the query behavior, the risk data is directly encrypted and transmitted by both querying parties, and meanwhile, the pass certificate state change reflecting the risk data query behavior is recorded on the blockchain, so that the query safety is ensured, and the query information can be recorded in a public and safe manner. The representation relationship between the general evidence and the risk data volume can be agreed by an intelligent contract. For example, a change of 1 permit represents a query for a piece of risk data. The state of the permit may also be used to gauge whether the member node qualifies or is capable of querying the risk data. If the member node does not have the pass certificate, the risk data cannot be inquired. The change of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query
The first member node can adopt a preposed inspection mode, firstly, the number of the second member nodes is obtained on the block chain or in the block chain state database, whether the number of the second member nodes reaches the threshold value is inspected, if the number of the second member nodes reaches the threshold value, the subsequent risk data query process is carried out, and otherwise, the risk data query request of the second member nodes is rejected. The member nodes can avoid other member nodes from illegally obtaining risk data to a certain extent through the preposed check.
And step S106, the first member node returns the risk data query result to the second member node under the condition that the second member node evidence-passing state meets the condition of the risk data query.
The risk data query result may include: querying the obtained risk data (including the corresponding user identification) and querying the ID. Further, the risk data query result may further include: a timestamp, an identification of the first member node (inquired party), a query type (personal or batch), etc.
In order to further improve the security of risk data query and protect the privacy of users. The risk data obtained by inquiry can be encrypted, and the encryption method with consistent negotiation can be adopted for encryption, so that the subsequent decryption of the first member node is facilitated. For example, the public key of the second member node may be used to encrypt the queried risk data to obtain an encrypted result, so that the second member node subsequently decrypts the encrypted result by using its own private key. Furthermore, the first member node can also utilize a private key of the first member node to sign the encrypted result of the risk data obtained by inquiry, so that the second member node can verify that the information belongs to the information sent by the first member node, and the safety of risk data inquiry is further enhanced.
Through the pre-verification method in the foregoing embodiment, the first member node may verify that the second member node has a certain risk data query capability, and the actual query information needs to be determined according to the number of risk data returned by the first member node. In some embodiments, the first member node returns a risk data query result to the second member node according to the number of the second member node when the number of the second member node reaches the threshold, and the number of the risk data included in the risk data query result is not greater than the number of the second member node.
For example, the second member node is to query risk data information of 10 users, the first member node verifies that the second member node currently holds 5 passes, and if the number of passes exceeds a preset threshold value by 1, the second member node queries according to a request of the second member node. After that, although the first member node queries the risk data information of 6 users, the first member node only returns the risk data of 5 users to the second member node.
Step S108, the first member node initiates a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain.
The query information comprises the change of the two-party evidence obtaining state caused by the risk data query. The first member node may initiate a query confirmation request at any time after the risk data query is completed. The accounting mode of the block chain system causes that the inquiry can not be carried out in real time, the risk data is inquired in real time by adopting the scheme, and the real-time performance and the safety of the risk data inquiry are balanced after accounting.
Although the risk data is queried in real time and then recorded in the block chain, the query capability and the query information among the member nodes are public, transparent and not falsifiable. The inquired party (provider) of the risk data cannot initiate inquiry information at will, and the inquired party (requester) of the risk data recorded in the blockchain can inquire the inquiry information at any time and can perform auditing. The inquirer (requester) of the risk data cannot be trusted, because the inquired party (provider) of the risk data can be confirmed by each member node according to the intelligent contract inquiry information after initiating the inquiry confirmation request in the blockchain system, and the number of the certificates of the inquirer (requester) of the risk data can be automatically reduced correspondingly.
The design of the general evidence is convenient for realizing the scheme of post accounting and can protect the privacy of risk data query. The general certificate can be regarded as a consensus mechanism, the representation mode of the inquiry information agreed among the coalition members can be exchanged with the legal tender, and the real inquiry can be realized.
The method of the embodiment realizes the sharing of risk data among the members of the alliance based on the block chain technology. The evidence-passing state of the member nodes in the blockchain system is recorded in the blockchain and is used for reflecting the risk data query capability. After receiving a risk data query request sent by a second member node, a first member node verifies the second member node based on the certification passing state of the second member node recorded in the block chain, and returns a risk data query result to the second member node in real time under the condition that the certification passing state of the second member node meets the condition of the risk data query. And then the first member node can initiate a query confirmation request according to the query of the current risk data so that the member nodes in the block chain system write the query information into the block chain. The general certificate in the method of the embodiment is used as a certificate for risk data query, and the query process of the risk data can be reflected through the general certificate state change of each member node, and the query capability of the member node can also be verified. The risk data between enterprises are inquired in a public and transparent mode, the inquiry information is safely recorded and cannot be falsified, the tracing is convenient, and transparent and safe risk data sharing among the enterprises is realized.
In order to further promote fair, transparent and safe risk data query among the coalition members, the member nodes are prevented from bypassing the block chain system, and the uncompensated use is formed. The utility model provides an embodiment of dividing member node into business server and block chain server, the business server mainly used stores the risk data, and the interface diversity of business server is handled by block chain server is unified, shields interface diversity, assembles data into the interactive interface format between the block chain server and carries out the interaction. Further embodiments of the disclosed data sharing method are described below in conjunction with fig. 2.
FIG. 2 is a flow chart of other embodiments of the disclosed data sharing method. As shown in fig. 2, the method of this embodiment includes: steps S202 to S216.
In step S202, the service server of the second member node sends an address query request to the blockchain server of the second member node.
In step S204, the blockchain server of the second member node returns the address of the blockchain server of each member node of the latest version to the service server of the second member node. Such as an IP address.
The interfaces of all member nodes are stored in the block chain server, and the service server cannot directly call the interfaces of other member nodes for interaction.
Step S206, the service server of the second member node initiates a risk data query request to the blockchain server of the first member node through the blockchain server of the second member node.
Step S208, the blockchain server of the first member node checks whether the certification passing state of the second member node meets the condition of the risk data query.
Step S210, the blockchain server of the first member node forwards the risk data query request to the service server of the first member node when the second member node certification status satisfies the condition of the risk data query this time.
Step S212, the business server of the first member node returns the risk data query result to the blockchain server of the first member node.
In step S214, the blockchain server of the first member node returns the risk data query result to the service server of the second node through the blockchain server of the second member node.
In step S216, the blockchain server of the first member node initiates a query confirmation request according to the risk data query result, so that the member nodes in the blockchain system write the query information of the first member node and the second member node into the blockchain.
In the method of the embodiment, the interface of the service server of the member node is invisible to other member nodes, and the blockchain server realizes the process of adding the query information into the blockchain based on the consensus mechanism, so that the direct calling of the interface of the other party between the service servers is avoided, and the blockchain system is bypassed, thereby forming the gratuitous use. The embodiment can further promote fair, transparent and safe inquiry risk data among the coalition members.
The process of recording query information in a blockchain in the present disclosure is described below in conjunction with fig. 3.
FIG. 3 is a flow chart of further embodiments of the data sharing method of the present disclosure. As shown in fig. 3, the method of this embodiment includes: steps S302 to S306.
Step S302, the first member node sends a query and confirmation request to the member nodes in the blockchain system, where the query and confirmation request includes query information of the risk data.
The first member node, i.e., the risk data, is queried or provided.
And step S304, verifying the received inquiry information of the risk data by the member nodes in the block chain system according to the intelligent contract and returning a verification result.
The query information comprises: query ID, risk data providing quantity (which may include number of queries, number of hits), number of to-be-cleared certificates, signature information of first member node, signature of second member node, request type, request timestamp, result return timestamp, query validation request timestamp, and the like.
Each member node performs the following verification: and verifying whether the query ID exists or not, and if so, returning a verification result that the query is invalid. Verifying the signatures of the two parties according to the public keys of the risk data requester and the provider; verifying whether the number of the certificates calculated according to the intelligent contract, the risk data providing number and the request type is consistent with the number of the certificates to be cleared; and verifying whether the current state of the risk data requester satisfies the number of the certificates to be cleared.
Step S306, the member nodes in the block chain system receive the blocks generated according to the inquiry information of the risk data, and add the blocks into the block chain.
In some embodiments, the first member node collects the verification results of the other member nodes and sends the verification results and the query information to the ranking node. The sequencing node judges whether the query is valid (for example, if more than 50% of member nodes pass the verification, the query is considered to be valid) according to the intelligent contract and the verification result for marking, the query information in a preset time period is sequentially divided into a plurality of groups, and each group of generating blocks is sent to each member node. And after each received block, updating the state of the permit of each member node in the block chain state database again according to whether the query information is effective or not.
In some embodiments, the method may further include: step S305, the member nodes in the block chain system update the state of the permit of the member nodes of both inquiry parties in the block chain state database according to the inquiry information of the risk data.
By the method of the embodiment, the query information of the risk data is stored in the block chain, so that the transparency, the safety and the traceability of the query information are ensured.
In order to further improve fairness, transparency and safety of risk data query among the coalition members, the present disclosure further provides an auditing method, where a member node can audit and modify query information that has been added to a block chain, which is described below with reference to fig. 4.
FIG. 4 is a flow chart of further embodiments of the data sharing method of the present disclosure. As shown in fig. 4, the method of this embodiment includes: steps S402 to S410.
And step S402, the second member node audits the inquiry information of the first member node and the second member node stored in the block chain.
The second member node can audit the query information in the block chain at any time, and whether the audit is consistent with the actual query information or not can be judged. And the second member node can also perform auditing according to the certification status of each member node in the block chain status database.
Step S404, the second member node responds to the query information error, and initiates a certification and correction request to the member nodes in the blockchain system.
The certificate clearing request comprises the following steps: and the platform node signs the query ID corresponding to the wrong query information.
For example, when a risk data query process occurs between the second member node and the first member node, 5 passes should be paid, and the query confirmation request initiated by the first member node records that the second member node pays 6 passes, which results in that the number of passes of the second member node is reduced by 6 after the query information is confirmed. The second member node may initiate a credential rush-forward request after discovering that the query message is incorrect.
The second member node may first initiate a certification conflict application to a platform node in the blockchain system, and the platform node receives the first member node and the second member node for review about the certification of the query. And the platform node checks that the query information is really wrong, and returns a verification forward-checking allowing instruction to the second platform node, wherein the signature of the platform node on the query ID is carried. The platform node can be any member node in the blockchain system, and the added functions of the node are specified by the intelligent contract, such as issuing a certificate, verifying the certificate and making a positive application.
And step S406, the member nodes in the block chain system verify the received certification-based positive request according to the intelligent contract and return a verification result.
Member nodes in a blockchain system, for example, need to verify the following: verifying the signature of the platform node on the query ID according to the public key of the platform node; and inquiring corresponding wrong inquiry information in the block chain or block chain state database according to the inquiry ID, and verifying whether the current verification quantity of the first member node and the second member node is enough to carry out correction according to the change of the verification state of the first member node and the second member node recorded in the wrong inquiry information. And whether the initiator of the certificate clearing request is the risk data inquirer corresponding to the error inquiry information can be verified.
The certification-passing is just changing the certification state of the two member nodes into the state which is supposed under the condition that the query does not occur. For example, the first member node and the second member node inquire the risk data to cause that the first member node deducts 6 passes, and the second member node increases 6 passes, if the first member node carries out pass and correction, 6 passes are correspondingly added to the first member node in the current pass state, and the second member node deducts 6 passes. Therefore, each member node needs to verify whether the current number of certificates of both parties is enough to carry out correction.
In step S408, the member node in the blockchain system receives the block generated according to the certificate conflict information, and adds the block to the blockchain.
The query ID in the new block is generated by adopting the previous query ID, namely the query ID corresponding to the error query information, and meanwhile, the positive punching information in the new block punches the positive punching label, so that the record in the block chain is prevented from being disordered.
In some embodiments, the method may further include: step S407, the member nodes in the blockchain system update the certification passing states of the member nodes of both querying parties in the blockchain state database according to the certification passing information. Specifically, a value corresponding to the query ID is read and rewritten in the block chain state database, and a correction field, a correction ID signature, a correction reason, a correction timestamp, and the like are added.
And step S410, the first member node responds to the certificate clearing information and writes the certificate clearing information into the block chain, and initiates a query confirmation request again according to the risk data query information.
The query confirmation request initiation process and the process of adding query information into the block chain, as described in the foregoing embodiments, are not described herein again. Incorrect query information can cause the issuance and billing of two requests for warranty and query confirmation: corresponding query information is recorded in the blockchain by proving a query confirmation request of the positive request and the reinitiated risk data.
In the method of the embodiment, both risk data inquiry parties can audit historical inquiry information at any time, and can perform certification clearing aiming at error inquiry information to generate certification clearing records in the block chain. Because various information or modification of the query is recorded in the block chain, the process can be completely and accurately traced by the method aiming at any query, and the fairness, transparency and safety of the risk data query among the coalition members are further improved.
Because the inquiry of the risk data continuously occurs, the inquiry information adopts a post-accounting method, which may cause that the change requirements of the certificate-passing states of both inquiry parties cannot be met during accounting, or the change requirements of the certificate-passing states of both inquiry parties cannot be met during certificate-passing. To address this problem, the present disclosure also proposes a retransmission mechanism. In the above embodiments, it is mentioned that, for any one of query, certificate issuing, or certificate checking, each member node verifies whether the relevant information is valid or invalid before joining the blockchain, and writes the relevant information that is finally determined to be invalid into the blockchain by marking an invalid tag. The initiator of the query confirmation request, the receipt-based positive-going request, and the like can reinitiate the request at preset intervals according to a retransmission mechanism until the query information or the receipt-based positive-going information is determined to be valid and written into the block chain.
Specifically, in some embodiments, under the condition that the number of certificates approved by the first member node or the second member node cannot meet the change of the number of certificates approved by both parties caused by the risk data query, the query information of the risk data is marked as invalid in the block chain, and the first member node re-initiates the query confirmation request according to a preset period until the number of certificates approved by the first member node or the second member node meets the change of the number of certificates approved by both parties caused by the risk data query, so as to generate effective risk data query information;
in other embodiments, when the number of certificates of the first member node or the second member node cannot meet the change of the number of certificates of both parties caused by the certificate of the second member node, the certificate of the second member node is marked as invalid in the block chain, and the second member node re-initiates the request for certificate of the second member node according to a preset period until the number of certificates of the first member node or the second member node meets the change of the number of certificates of both parties caused by the certificate of the second member node, so as to generate effective certificate of the second member node.
In some embodiments, all operations of the same member node are executed in series, that is, the subsequent query is successfully sent again after the preamble query generates the block, so that the condition that the certificate of the same member node is used for querying for many times can be avoided to a certain extent, and the fairness and the safety of the query are improved. But unrelated operations of different member nodes can be performed in parallel and confirmed in the same block.
The present disclosure also provides a design scheme for a double-layered passport issue two passports in a consensus manner. The witness pass may include a query pass for querying risk data, as well as a rights pass for reflecting the value of the risk data provided by the member node or reflecting the contribution of the member node to the entire federation. The state change of the inquiry permit can be directly used for reflecting the inquiry behaviors of both inquiry parties and the number of inquiry risk data, namely the state change of the inquiry permit is caused firstly by the inquiry behaviors. Meanwhile, the inquiry general evidence is used for reflecting whether the member nodes have inquiry capability or not and inquiring the number of risk data. The state change of the rights-to-benefit evidence is mainly used for reflecting the number of risk data provided by the member nodes as risk data providers in the inquiry process. Rights-of-interest-warrants are equivalent to providing an equal, reasonable, and secure feedback mechanism for evaluating the risk data provided by the individual members.
In some embodiments, the block includes a change in status of the query permit of both parties to the risk data query. According to the characterization relation between the query permit and the risk data query quantity in the intelligent contract, the block can comprise the quantity of the query permits increased by the risk data provider and the quantity of the query permits reduced by the risk data requester. Further, the member nodes in the blockchain system increase the number of inquiry certificates of the member nodes of the risk data provider in the blockchain state database, and reduce the number of inquiry certificates of the member nodes of the risk data receiver (requester or inquirer). For example, a change of 1 query permit indicates to query one piece of risk data, the node a queries 10 pieces of risk data to the node B, the node B returns corresponding risk data to the node a, and information indicating that the node a has decreased by 10 query permits and the node B has increased by 10 query permits may be recorded in the block. Each member node can also update the current inquiry number of the node A and the node B in the block chain state database.
To ensure equal status of each member in the federation, when the blockchain system is initially established, each member node is configured to have an equal number of query passes, i.e., each member node has equal query opportunities. One of the member nodes may be configured as a platform node for performing the credentialing operations for the other member nodes in the blockchain system, which are also written in advance to the intelligent contract. The member nodes can initiate an initialization request according to the intelligent contract under the condition of initially joining the blockchain system, wherein the initialization request comprises the step of issuing a preset number of inquiry pass certificates to the member nodes, so that each member node writes the information of issuing the inquiry pass certificates to the member nodes into the blockchain. The specific process is as follows.
(1) The first member node joins the blockchain system and initiates initialization requests to other member nodes in the blockchain system.
(2) And the other member nodes verify the received initialization request according to the intelligent contract and return a verification result.
(3) And each member node updates the inquiry and evidence-passing state of the first member node in the block chain state database according to the initialization information.
(4) And each member node receives the block returned by the sequencing node and adds the block into the block chain. The block contains initialization related information.
In order to further evaluate the risk data provided by each member, the member nodes are promoted to provide more valuable risk data, and the member nodes can obtain a certain amount of interest pass-evidence after providing the risk data.
In some embodiments, when the preset period is over, the platform node queries the right benefit evidence state of each member node, determines the value of the risk data provided by each member node in the preset period, and writes the value of the risk data provided by each member node in the preset period into the block chain through the right benefit evidence state change form. The number of rights-to-benefit passes is used for reflecting the number of risk data provided by the member node to the risk data requester. The more the member nodes provide the risk data to the risk data requester, the more the number of times the provided risk data is queried by other member nodes is, the more valuable the provided risk data is, and the greater the contribution to the federation data sharing is.
Further, in each inquiry process of the risk data, besides changing the inquiry state of the member nodes of the inquiry parties, the number to be settled of the rights and benefits of the member nodes of the inquiry parties needs to be determined. Each member node updates the number of rights to be settled and benefits and permits of the risk data provider in the block chain state database, the platform node determines the value of the risk data provided by each member node in the preset period according to the number of the rights to be settled and benefits and permits of each member node, issues the rights to be settled and benefits and permits to each member node according to the number of the rights to be settled and benefits and permits, and writes the information of the rights to be issued and benefits and permits into the block chain.
The representation relationship between the right benefit evidence and the number of risk data provided by the risk data provider in the inquiry process can be realized according to the intelligent contract agreement. For example, 1 entitlement voucher represents a piece of risk data provided in a query. And after each member node receives the inquiry confirmation request, updating the rights to be settled and the benefit and evidence number of the risk data provider in the block chain state database according to the intelligent contract. And then the platform node can inquire the number of the rights to be settled and the benefits and the evidences of each member node in the block chain state database, so that the value of the risk data provided by each member node is determined.
In order to ensure the accuracy of the quantity of the rights to be settled and the benefits and the certificates of the member nodes inquired by the platform node, the platform node can verify the accuracy of the quantity of the rights to be settled and the benefits and the certificates of the certificate to be settled and the certificates of the member nodes in the block chain according to the state change of the inquiry certificates. Since each member node stores the block chain state database, the platform node can also request other member nodes to verify the accuracy of the number of the rights and benefits of the certificate to be settled. And when the platform node finishes the preset period, settling the rights and interests permit to be settled of each member node. The state of the evidence is recorded through the block chain system, and the state cannot be tampered, so that the evaluation on the value of the risk data provided by each member is more accurate and reasonable.
The process of issuing the rights to benefit pass certificate by the platform node is as follows.
(1) And the platform node responds to the end of the preset period and inquires the state of the right benefit permit of each member node.
(2) The platform node initiates a right benefit evidence settlement instruction. The right benefit pass settlement instruction comprises the state change information of the right benefit pass of each member node.
(3) And each member node verifies the received equity pass settlement instruction according to the intelligent contract and returns a verification result.
The right benefit pass settlement instruction comprises the following steps: inquiring ID, signature for certificate passing, instruction type and request timestamp; the member node is configured to verify whether the signature of the entitlement clearing settlement instruction is the signature of the platform node according to the instruction type and the public key of the platform node. The member node can acquire the public key of the platform node to decrypt the signature of the interest and interest passing certificate settlement instruction, so that whether the signature is the signature of the platform node is verified.
(4) And each member node updates the state of the right benefit permit of each member node in the block chain state database.
(5) And each member node receives the block generated according to the rights and benefits accrual certificate settlement instruction and adds the block into the block chain.
In some embodiments, the rights and benefits voucher can be exchanged with the query voucher, so that the members providing the risk data with higher value can have stronger query capability, virtuous circle of sharing data by members in the alliance is promoted, and the members are promoted to provide the risk data with higher value. The number of 1 equity pass exchanged for a query pass may be defined as the exchange rate. In order to ensure that the number of inquiry certificates in the system can meet the inquiry requirements of each member node, the dynamic exchange rate can be set.
In some embodiments, the platform node determines the exchange rate of the inquiry permit and the right benefit permit according to the total number of the inquiry permits and the total number of the right benefit permits of each member node when the preset inquiry period is over, and writes the exchange rate into the intelligent contract. Further, the exchange rate in the next preset period may be a ratio of the total inquiry pass amount and the total equity pass amount of each member node at the end date of the period.
In some embodiments, the member node may initiate a voucher redemption request, and the other member nodes verify the received voucher redemption request and return a verification result according to the intelligent contract; and receiving a block generated according to the certificate-passing exchange request, and adding the block into a block chain, wherein the block comprises the inquiry certificate of the certificate-passing exchange request initiator and the state change of the rights and interests certificate. Meanwhile, each member node can be further configured to update the state of the permit exchange request initiator in the block chain state database according to the permit exchange request.
To facilitate providing more valuable risk data to individual members, query passes may be issued to individual member nodes. In the process of querying the risk data, the risk data receiving direction provides the platform node with the query permit in a preset proportion, that is, the number of the query permits provided for the platform node is determined according to the change number and the preset proportion of the query permits of both querying parties. The certified status changes of the platform nodes are also recorded in the blockchain. When the preset query is finished, the platform nodes are further configured to issue the query pass certificate to each member node according to the number of the right benefit pass certificates of each member node, the query pass certificate number of the platform nodes and the intelligent contract under the condition that the preset period is finished, and write the information of the issued query pass certificate into the block chain.
For example, the intelligent contract promises to issue all inquiry passes of the platform nodes to each member node according to the proportion of the number of the rights and benefits passes of each member node. For example, if the platform node holds 5 inquiry passes, and the ratio of the number of rights and benefits passes held by the node a to the number of rights and benefits passes held by the node B is 2:3, the platform node issues 2 inquiry passes to the node a and 3 inquiry passes to the node B. The settlement of the right to be settled and the benefit pass certificate of each member node in the foregoing embodiment may be performed first, and then the issuing process of the inquiry pass certificate in this embodiment may be performed.
In the above embodiments, the platform node may issue a query pass, a rights and interests pass, and the like to the member node. Specifically, the platform node initiates a pass-certificate issuing instruction, wherein the pass-certificate issuing instruction comprises pass-certificate issuing objects and the number of issued pass certificates; the member node is configured to verify the received certification-based issuing instruction according to the intelligent contract and return a verification result, receive the block generated according to the certification-based issuing instruction, and add the block into the block chain.
Further, the certificate issuing instruction comprises: inquiring ID, signature for certificate passing, instruction type and request timestamp; the member node is configured to verify whether the certified signature is the signature of the platform node according to the instruction type and the public key of the platform node. The member node can acquire the public key of the platform node to decrypt the signature issued by the certificate so as to verify whether the signature is the signature of the platform node.
In the risk data query process, the member node initiates query information in the query confirmation request, and the query information comprises the following steps: the system comprises a query ID, a signature of a risk data request result, a risk data providing quantity, a request type, a to-be-cleared certification quantity, a request timestamp and a result return timestamp. The method can also comprise the following steps: query validation request timestamp, risk data request quantity, etc. Accordingly, the member node is configured to verify the following: verifying the signature of the risk data request and the signature of the risk data request result according to public keys of a risk data requester and a risk data provider; verifying whether the number of the certificates calculated according to the intelligent contract, the risk data providing number and the request type is consistent with the number of the certificates to be cleared; and verifying whether the current state of the risk data requester satisfies the number of the certificates to be cleared. For example, different request types may correspond to different redemption ratios for the risk data providing amount and the amount of the voucher.
The above embodiments form a complete set of scheme for realizing the sharing of the risk data of each member based on the block chain technology. All the inquiry of risk data and the issuance of the certificate are recorded in the blockchain, are transparent and have the property of being not falsifiable. In addition, the design of the double-layer general evidence can not only ensure the privacy of the risk data and facilitate the recording and query of information, but also promote the virtuous circle of data sharing and promote the members to provide more valuable risk data.
The present disclosure also provides a member node, which may be the first member node in the blockchain system in the foregoing embodiment, and is described below with reference to fig. 5.
Fig. 5 is a block diagram of some embodiments of a member node of the present disclosure. As shown in fig. 5, the member node 50 of this embodiment includes: a query request receiving module 502, a checking module 504, a query result sending module 506, and a query confirming module 508.
The query request receiving module 502 is configured to receive a risk data query request sent by a second member node, where the second member node is a member node in the blockchain system.
The checking module 504 is configured to check whether the certification passing state of the second member node meets the condition of the risk data query, where the certification passing state is stored in the block chain and used to reflect the risk data query capability of the second member node.
In some embodiments, the pass status includes: the number of the general certificates; the change of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query.
In some embodiments, the pass includes a query pass and a rights pass; the risk data requester deducts the corresponding inquiry permit number according to the number of the risk data hit by inquiry, and the risk data provider increases the corresponding inquiry permit number and the right and interest permit number according to the number of the risk data hit by inquiry; the rights and benefits voucher is used for reflecting the value of risk data provided by each member node in a preset period, and is exchanged to query vouchers according to the exchange rate of the current period specified by the intelligent contract. Reference may be made in particular to the description in the preceding embodiments.
And the query result sending module 506 is configured to return a risk data query result to the second member node when the second member node evidence obtaining state meets the condition of the risk data query this time.
The state of the certificate of pass includes: number of general evidences. In some embodiments, the query result sending module 506 is configured to, when the number of pass certificates of the second member node reaches the threshold, return a risk data query result to the second member node according to the number of pass certificates of the second member node, where the number of risk data included in the risk data query result is not greater than the number of pass certificates of the second member node.
The query confirmation module 508 is configured to initiate a query confirmation request according to the risk data query result, so that the member nodes in the blockchain system write query information of the first member node and the second member node into the blockchain, where the query information includes change information of the certification statuses of the first member node and the second member node caused by the risk data query.
In some embodiments, the first member node may include: a traffic server and a blockchain server. The query request receiving module 502 is disposed in the blockchain server, and is configured to receive a risk data query request sent by the blockchain server of the second member node, where the risk data query request is sent to the blockchain server of the second member node by the service server of the second member node; the checking module 504 is arranged in the block chain server, and is configured to forward a risk data query request to a service server of a first member node and receive a risk data query result returned by the service server of the first member node when the second member node is in a certified state meeting the condition of the risk data query; the query result sending module 506 is arranged in the blockchain server, and is configured to return a risk data query result to the service server of the second node through the blockchain server of the second member node; the query confirmation module 508 is disposed in the blockchain server, and configured to initiate a query confirmation request according to the risk data query result, so that the member nodes in the blockchain system write the query information of the first member node and the second member node into the blockchain.
The present disclosure also provides a data sharing system, described below in conjunction with fig. 6.
FIG. 6 is a block diagram of some embodiments of the data sharing system of the present disclosure. As shown in fig. 6, the system 6 of this embodiment includes: a member node 50 of any of the preceding embodiments configured as a first member node; and a second member node 60.
And the second member node 60 is configured to send a risk data query request to the first member node 50, and receive a risk data query result returned by the first member node 50 when the second member node 60 is in a certified state meeting the condition of the risk data query this time.
In some embodiments, the second member node 60 comprises: a service server and a block chain server; the business server of the second member node is used for sending an address query request to the blockchain server of the second member node, receiving the address of the blockchain server of each member node of the latest version returned by the blockchain server of the second member node, selecting the address of the blockchain server of the first member node, and sending a risk data query request.
In some embodiments, the second member node 60 is further configured to audit query information of the first member node 50 and the second member node 60 stored in the blockchain, determine whether the query information is correct, and in response to a query information error, initiate a certification correcting request to a member node in the blockchain system, so that the member node in the blockchain system writes the certification correcting information into the blockchain, and corrects the wrong query information;
first member node 60 is also operative to reinitiate the query confirmation request based on the correct risk data query information in response to the credential flung information being written to the blockchain.
In some embodiments, the credential positive request comprises: and the platform node signs the query ID corresponding to the wrong query information. The data sharing system 6 further includes: at least one other member node 70.
And the other member nodes 70 are configured to verify the signature of the platform node on the query ID according to the public key of the platform node, query corresponding wrong query information according to the query ID, and verify whether the current number of the pass-certificates of the first member node and the second member node is sufficient for correcting according to the change of the pass-certificate states of the first member node and the second member node recorded in the wrong query information.
In some embodiments, the other member node 70 is configured to receive a query confirmation request sent by the first member node 50, the query confirmation request including query information of the risk data; verifying the received inquiry information of the risk data according to the intelligent contract and returning a verification result; and receiving a block generated according to the inquiry information of the risk data, and adding the block into a block chain, wherein the block comprises the state change information of the certificates of both risk data inquiry parties.
It should be noted that the descriptions of "first", "second", etc. in this disclosure are only used to distinguish different nodes in different scenarios, and are not used to limit a specific certain node. In fact, the member nodes in the blockchain system in the present disclosure may be configured to have the same function, and all of them may implement the functions in the above embodiments.
The data sharing apparatus in the embodiments of the present disclosure may each be implemented by various computing devices or computer systems, which are described below in conjunction with fig. 7 and 8.
FIG. 7 is a block diagram of some embodiments of a data sharing device of the present disclosure. As shown in fig. 7, the apparatus 70 of this embodiment includes: a memory 710 and a processor 720 coupled to the memory 710, the processor 720 configured to perform a data sharing method in any of the embodiments of the present disclosure based on instructions stored in the memory 710. The memory and the processor may be provided in a plurality of different member nodes.
The memory 710 may include, for example, a system memory, a fixed non-volatile storage medium, and the like, where the system memory stores, for example, an operating system, application programs, a Boot loader (Boot L loader), databases, and other programs.
FIG. 8 is a block diagram of further embodiments of the data sharing device of the present disclosure. As shown in fig. 8, the apparatus 80 of this embodiment includes: memory 810 and processor 820 are similar to memory 710 and processor 720, respectively. Input-output interface 780, network interface 840, storage interface 850, etc., may also be included. These interfaces 830, 840, 250 and the memory 810 and the processor 820 may be connected, for example, by a bus 860. The input/output interface 830 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 840 provides a connection interface for various networked devices, such as a database server or a cloud storage server. The storage interface 850 provides a connection interface for external storage devices such as an SD card and a usb disk.
The present disclosure also provides a computer-readable storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the data sharing method of any of the foregoing embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (19)

1. A method of data sharing, comprising:
a first member node receives a risk data query request sent by a second member node, wherein the first member node and the second member node are member nodes in a blockchain system;
the first member node checks whether the evidence passing state of the second member node meets the condition of the risk data query, and the evidence passing state is stored in a block chain and used for reflecting the risk data query capability of the second member node; wherein the pass-certificate status comprises: the number of the general certificates;
the first member node returns a risk data query result to the second member node under the condition that the second member node evidence-passing state meets the condition of the risk data query;
the first member node initiates a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain, wherein the query information comprises the change information of the evidence passing states of the first member node and the second member node caused by risk data query;
the change information of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query.
2. The data sharing method according to claim 1,
the first member node returning the risk data query result to the second member node comprises:
and the first member node returns a risk data query result to the second member node according to the evidence passing number of the second member node under the condition that the evidence passing number of the second member node reaches a threshold value, wherein the number of the risk data contained in the risk data query result is not more than the evidence passing number of the second member node.
3. The data sharing method according to claim 1,
the block chain server of the first member node receives a risk data query request sent by a block chain server of a second member node, and the risk data query request is sent to the block chain server of the second member node by a service server of the second member node;
the block chain server of the first member node checks whether the certification passing state of the second member node meets the condition of the risk data query;
the block chain server of the first member node forwards the risk data query request to a service server of the first member node and receives a risk data query result returned by the service server of the first member node under the condition that the certification status of the second member node meets the condition of the risk data query;
the blockchain server of the first member node returns a risk data query result to the business server of the second node through the blockchain server of the second member node;
and the blockchain server of the first member node initiates a query confirmation request according to the risk data query result, so that the member nodes in the blockchain system write the query information of the first member node and the second member node into the blockchain.
4. The data sharing method of claim 3, further comprising:
the service server of the second member node sends an address query request to the blockchain server of the second member node;
and the service server of the second member node receives the address of the blockchain server of each member node of the latest version returned by the blockchain server of the second member node, so that the service server of the second member node selects the address of the blockchain server of the first member node and initiates a risk data query request.
5. The data sharing method of claim 1, further comprising:
the second member node audits the query information of the first member node and the second member node stored in the block chain, and whether the query information is correct is determined;
the second member node responds to the query information error, and initiates a certification-based correction request to the member nodes in the blockchain system, so that the member nodes in the blockchain system write the certification-based correction information into the blockchain and correct the wrong query information;
and the first member node responds to the verification and correction information written into the block chain, and re-initiates the query confirmation request according to correct risk data query information.
6. The data sharing method of claim 5,
the certificate clearing request comprises the following steps: the platform node signs the inquiry ID corresponding to the wrong inquiry information;
writing, by a member node in the blockchain system, the general authentication information to a blockchain comprises:
the member nodes in the block chain system verify the signature of the platform node on the inquiry ID according to the public key of the platform node;
and the member nodes in the block chain system inquire the corresponding wrong inquiry information according to the inquiry ID, and verify whether the current evidence passing quantity of the first member node and the second member node is enough to carry out correction or not according to the change of the evidence passing state of the first member node and the second member node recorded in the wrong inquiry information.
7. The data sharing method according to claim 1,
writing, by a member node in the blockchain system, query information of the first member node and the second member node into the blockchain comprises:
the method comprises the steps that a member node in a block chain system receives a query confirmation request sent by a first member node, wherein the query confirmation request comprises query information of risk data;
the member nodes in the block chain system verify the received inquiry information of the risk data according to the intelligent contract and return a verification result;
and the member nodes in the block chain system receive the blocks generated according to the inquiry information of the risk data and add the blocks into the block chain, wherein the blocks comprise the state change information of the certificates of both risk data inquiry parties.
8. The data sharing method according to any one of claims 1 to 7,
the pass certificate comprises a query pass certificate and a rights and interests pass certificate;
the risk data requester deducts the corresponding inquiry permit number according to the number of the risk data hit by inquiry, and the risk data provider increases the corresponding inquiry permit number and the right and interest permit number according to the number of the risk data hit by inquiry;
the right benefit voucher is used for reflecting the value of risk data provided by each member node in a preset period, and is exchanged to the inquiry voucher according to the exchange rate of the current period specified by the intelligent contract.
9. A member node, wherein the member node is a first member node in a blockchain system, comprising:
the query request receiving module is used for receiving a risk data query request sent by a second member node, wherein the second member node is a member node in the block chain system;
the checking module is used for checking whether the evidence passing state of the second member node meets the condition of the risk data query, and the evidence passing state is stored in the block chain and used for reflecting the risk data query capability of the second member node; wherein the pass-certificate status comprises: the number of the general certificates;
the query result sending module is used for returning a risk data query result to the second member node under the condition that the second member node evidence-passing state meets the condition of the risk data query;
the query confirmation module is used for initiating a query confirmation request according to the risk data query result so that the member nodes in the block chain system write the query information of the first member node and the second member node into the block chain, wherein the query information comprises the change information of the evidence-passing states of the first member node and the second member node caused by risk data query;
the change information of the number of the certificates is determined according to the number of the risk data hit by the member node query, the risk data requester deducts the corresponding number of the certificates according to the number of the risk data hit by the query, and the risk data provider increases the corresponding number of the certificates according to the number of the risk data hit by the query.
10. The member node of claim 9,
the query result sending module is used for returning a risk data query result to the second member node according to the number of the second member node in case that the number of the second member node in.
11. The member node of claim 9, wherein the first member node comprises: a service server and a block chain server;
the query request receiving module is arranged on the blockchain server and used for receiving a risk data query request sent by the blockchain server of the second member node, and the risk data query request is sent to the blockchain server of the second member node by the service server of the second member node;
the checking module is arranged on the block chain server and used for forwarding the risk data query request to the service server of the first member node and receiving a risk data query result returned by the service server of the first member node under the condition that the certification status of the second member node meets the condition of the risk data query;
the query result sending module is arranged on the blockchain server and used for returning a risk data query result to the service server of the second node through the blockchain server of the second member node;
the query confirmation module is arranged in the blockchain server and used for initiating a query confirmation request according to the risk data query result so that the member nodes in the blockchain system can write the query information of the first member node and the second member node into the blockchain.
12. The member node of any of claims 9-11,
the pass certificate comprises a query pass certificate and a rights and interests pass certificate;
the risk data requester deducts the corresponding inquiry permit number according to the number of the risk data hit by inquiry, and the risk data provider increases the corresponding inquiry permit number and the right and interest permit number according to the number of the risk data hit by inquiry;
the right benefit voucher is used for reflecting the value of risk data provided by each member node in a preset period, and is exchanged to the inquiry voucher according to the exchange rate of the current period specified by the intelligent contract.
13. A data sharing system, wherein the data sharing system is a blockchain system, comprising: the member node of any of claims 9-12 configured as a first member node; and
and the second member node is used for sending a risk data query request to the first member node and receiving a risk data query result returned by the first member node under the condition that the evidence-passing state of the second member node meets the condition of the risk data query.
14. The data sharing system of claim 13, wherein the second member node comprises: a service server and a block chain server;
the service server of the second member node is used for sending an address query request to the blockchain server of the second member node, receiving the address of the blockchain server of each member node of the latest version returned by the blockchain server of the second member node, selecting the address of the blockchain server of the first member node, and sending a risk data query request.
15. The data sharing system of claim 13,
the second member node is further configured to audit query information of the first member node and the second member node stored in the blockchain, determine whether the query information is correct, and initiate a certification correcting request to the member nodes in the blockchain system in response to an error in the query information, so that the member nodes in the blockchain system write the certification correcting information into the blockchain and correct the wrong query information;
and the first member node is also used for responding to the evidence-based conflict information written into the block chain and reinitiating the inquiry confirmation request according to the inquiry information of the correct risk data.
16. The data sharing system of claim 15, wherein the credential positive request comprises: the platform node signs the inquiry ID corresponding to the wrong inquiry information;
the system further comprises: at least one other member node;
the other member nodes are used for verifying the signature of the platform node on the query ID according to the public key of the platform node, querying the corresponding wrong query information according to the query ID, and verifying whether the current verification quantity of the first member node and the second member node is enough to carry out correction according to the change of the verification state of the first member node and the second member node recorded in the wrong query information.
17. The data sharing system of claim 13, further comprising: at least one other member node;
the other member nodes are used for receiving a query confirmation request sent by the first member node, and the query confirmation request comprises query information of risk data; verifying the received inquiry information of the risk data according to the intelligent contract and returning a verification result; and receiving a block generated according to the inquiry information of the risk data, and adding the block into a block chain, wherein the block comprises the state change information of the certificates of both sides of the risk data inquiry.
18. A data sharing apparatus, comprising:
a processor; and
a memory coupled to the processor, the memory having stored therein a computer program executable by the processor to perform steps implementing the data sharing method of any one of claims 1-8.
19. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN201810470510.3A 2018-05-17 2018-05-17 Data sharing method, device, system, member node and readable storage medium Active CN108462724B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810470510.3A CN108462724B (en) 2018-05-17 2018-05-17 Data sharing method, device, system, member node and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810470510.3A CN108462724B (en) 2018-05-17 2018-05-17 Data sharing method, device, system, member node and readable storage medium

Publications (2)

Publication Number Publication Date
CN108462724A CN108462724A (en) 2018-08-28
CN108462724B true CN108462724B (en) 2020-07-31

Family

ID=63215406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810470510.3A Active CN108462724B (en) 2018-05-17 2018-05-17 Data sharing method, device, system, member node and readable storage medium

Country Status (1)

Country Link
CN (1) CN108462724B (en)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345390A (en) * 2018-09-25 2019-02-15 深圳市元征科技股份有限公司 A kind of intelligence contract access method, system, equipment and computer storage medium
CN110309259B (en) 2018-10-10 2021-09-03 腾讯科技(深圳)有限公司 Audit result data storage and query methods, and audit item storage method and device
CN109361688B (en) * 2018-11-16 2021-01-22 大唐高鸿信息通信(义乌)有限公司 Evidence storing method and system based on 5G architecture and block chain
CN111245877A (en) * 2018-11-29 2020-06-05 北京京东尚科信息技术有限公司 User risk index query method and device, electronic equipment and medium
CN109636402B (en) * 2018-12-14 2021-08-03 泰康保险集团股份有限公司 Credit information processing method, device, equipment and storage medium based on block chain
CN109685674A (en) * 2018-12-21 2019-04-26 众安信息技术服务有限公司 Order based on block chain leads to cardization, compensation, the method, apparatus of inquiry and storage medium
CN109583905A (en) * 2018-12-21 2019-04-05 众安信息技术服务有限公司 The method and apparatus for realizing data sharing based on the logical card of the utilization of block chain network
CN111723060B (en) * 2019-03-18 2023-04-21 南京星云数字技术有限公司 Blacklist data sharing method and system based on blockchain
CN109886695A (en) * 2019-03-26 2019-06-14 阿里巴巴集团控股有限公司 Information sharing method and device and electronic equipment between different blocks chain
CN109995791B (en) * 2019-04-11 2020-11-03 清华大学 Data authorization method and system
CN110493190B (en) * 2019-07-15 2022-07-08 平安科技(深圳)有限公司 Data information processing method and device, computer equipment and storage medium
CN112243047B (en) * 2019-07-19 2022-04-01 傲为有限公司 Public chain based block chain network addressing method
CN110533286B (en) * 2019-07-23 2023-04-18 平安科技(深圳)有限公司 Block chain-based coalition member management method and device and computer equipment
CN112019599A (en) * 2020-03-16 2020-12-01 支付宝(杭州)信息技术有限公司 Method and device for synchronizing processing messages during block chain consensus processing
CN111292093B (en) * 2020-05-09 2020-12-04 支付宝(杭州)信息技术有限公司 Risk control method and system based on double block chains
CN111797142A (en) * 2020-07-06 2020-10-20 北京荷月科技有限公司 Method and system for auditing data on link
CN111737279B (en) 2020-08-24 2020-12-18 支付宝(杭州)信息技术有限公司 Service processing method, device, equipment and storage medium based on block chain
CN111770198B (en) * 2020-08-31 2020-12-18 支付宝(杭州)信息技术有限公司 Information sharing method, device and equipment
CN112163034B (en) * 2020-09-03 2023-06-16 中国联合网络通信集团有限公司 Model sharing method, node and blockchain system
CN112447291B (en) * 2020-11-23 2023-03-28 四川大学华西医院 Block chain-based method for sharing hospital data
US12015616B2 (en) * 2021-01-13 2024-06-18 Level 3 Communications, Llc Conference security for user groups
CN113037497B (en) * 2021-03-15 2023-08-01 中国工商银行股份有限公司 Block chain-based risk data sharing method and system
CN114625899B (en) * 2022-03-14 2023-09-08 北京百度网讯科技有限公司 Information processing method, information processing device, electronic equipment and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10490304B2 (en) * 2012-01-26 2019-11-26 Netspective Communications Llc Device-driven non-intermediated blockchain system over a social integrity network
US10013573B2 (en) * 2015-12-16 2018-07-03 International Business Machines Corporation Personal ledger blockchain
AU2017223127B2 (en) * 2016-02-23 2023-01-05 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
EP3296913B1 (en) * 2016-09-15 2020-10-21 Accenture Global Solutions Limited Method and system for secure communication of a token and aggregation of the same
CN106412037A (en) * 2016-09-19 2017-02-15 中国银联股份有限公司 Security electronic file processing system and method based on block link structure
CN107979590B (en) * 2017-11-02 2020-01-17 财付通支付科技有限公司 Data sharing method, client, server, computing device and storage medium

Also Published As

Publication number Publication date
CN108462724A (en) 2018-08-28

Similar Documents

Publication Publication Date Title
CN108462724B (en) Data sharing method, device, system, member node and readable storage medium
CN108717443B (en) Data sharing method, block chain system and computer readable storage medium
CN109981679B (en) Method and apparatus for performing transactions in a blockchain network
Pasdar et al. Connect API with blockchain: A survey on blockchain oracle implementation
Niranjanamurthy et al. Analysis of Blockchain technology: pros, cons and SWOT
CN108667632B (en) Credit record sharing method and device based on block chain and electronic equipment
CN108604344B (en) Method and system for creating trusted digital asset transfers using digital signatures
CN107240001B (en) Transaction method and system for digital assets
CN109102269B (en) Transfer method and device based on block chain, block chain node and storage medium
US9032204B2 (en) Methods and systems for providing a signed digital certificate in real time
CN113537984A (en) Content verification method and device based on block chain and electronic equipment
CN116671087A (en) System and method for building blockchains to validate smart contract assets
CN110741599A (en) System and method for creating multiple records based on ordered intelligent contracts
US20220391887A1 (en) Systems and Methods for Maintenance of NFT Assets
US10643208B2 (en) Digital payment system
CN110597908B (en) Credit recording method, equipment and storage medium based on blockchain
Pasdar et al. Blockchain oracle design patterns
CN110569643A (en) traffic management method and device based on block chain network
US11570005B2 (en) Systems and methods for proving immutability of blockchains
CN111095863A (en) Block chain based system and method for communicating, storing and processing data over a block chain network
CN111429191A (en) Block chain-based electronic invoice flow management method, device and system
Menges et al. DEALER: decentralized incentives for threat intelligence reporting and exchange
CN112232828A (en) Power grid data transaction method and system
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
CN111274612B (en) Practitioner trust verification method and system, witness service system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100176 Beijing Daxing District Beijing Economic Development Zone, Chuang Chuang eleven Street 18 hospital C block 2 floor, 221 rooms.

Applicant after: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.

Address before: 100176 Beijing Daxing District Beijing Economic Development Zone, Chuang Chuang eleven Street 18 hospital C block 2 floor, 221 rooms.

Applicant before: BEIJING JINGDONG FINANCIAL TECHNOLOGY HOLDING Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Room 221, 2nd floor, C Block, 18 Kechuang 11th Street, Beijing Daxing District, Beijing

Patentee after: Jingdong Technology Holding Co.,Ltd.

Address before: Room 221, 2nd floor, C Block, 18 Kechuang 11th Street, Beijing Daxing District, Beijing

Patentee before: Jingdong Digital Technology Holding Co.,Ltd.

Address after: Room 221, 2nd floor, C Block, 18 Kechuang 11th Street, Beijing Daxing District, Beijing

Patentee after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: Room 221, 2nd floor, C Block, 18 Kechuang 11th Street, Beijing Daxing District, Beijing

Patentee before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.